Analysis

  • max time kernel
    37s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 07:27

General

  • Target

    7z2401.msi

  • Size

    1.4MB

  • MD5

    a141303fe3fd74208c1c8a1121a7f67d

  • SHA1

    b55c286e80a9e128fbf615da63169162c08aef94

  • SHA256

    1c3c3560906974161f25f5f81de4620787b55ca76002ac3c4fc846d57a06df99

  • SHA512

    2323c292bfa7ea712d39a4d33cdd19563dd073fee6c684d02e7e931abe72af92f85e5bf8bff7c647e4fcdc522b148e9b8d1dd43a9d37c73c0ae86d5efb1885c8

  • SSDEEP

    24576:S+xMHACSK47NXchb6OqTHHBniI4BqHsE4RKKKGE32/XlOA+gYy4isa444GuOlr3B:NMX747NXch+Oq7VsE44KPE3qlHyjwlrx

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\7z2401.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2296
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1996
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4328
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:916

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e581c2f.rbs

      Filesize

      20KB

      MD5

      dafeacf34ce456726cff46decbcc36aa

      SHA1

      e46a0f60b65cb3a83db5712be95b4d85ada7205b

      SHA256

      31507fa1e0953d3fe273f6b14c701136038954bb5055c8dfbe4c384d2e859796

      SHA512

      4bac3c7cb06e5c99b0ffae2c68f2f770da5ba1d7d4b7439d6a10bd268d460664a982c83d5750c567aa014fd77b05dd7d752d6489ee7e8fb03f42a25daf4c3556

    • C:\Windows\Installer\e581c2e.msi

      Filesize

      1.4MB

      MD5

      a141303fe3fd74208c1c8a1121a7f67d

      SHA1

      b55c286e80a9e128fbf615da63169162c08aef94

      SHA256

      1c3c3560906974161f25f5f81de4620787b55ca76002ac3c4fc846d57a06df99

      SHA512

      2323c292bfa7ea712d39a4d33cdd19563dd073fee6c684d02e7e931abe72af92f85e5bf8bff7c647e4fcdc522b148e9b8d1dd43a9d37c73c0ae86d5efb1885c8

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      4.4MB

      MD5

      6f73dfa1f5201a69402525f610016a47

      SHA1

      3d48930da308156c9d52fd2f7f694547726b5b20

      SHA256

      d5b6fb3e9e0c33253de5c9a9b7ee9734009abf4debe16b9711962e66cd11782f

      SHA512

      692620ba1d655d2cedc0bd9238234a66bea52b3dff0db86c1d7d0e642f8b77232917f8821e1b59344d690c23cf7a04ff4217510535ebd2c631228b6b6c9f1ddf

    • \??\Volume{0576a638-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{85fe6987-7391-4805-9e34-76c03178a50a}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      dab5569ce3951e4279402d7211c9cedb

      SHA1

      785ff8a6337eee20413b42c55c165b49183170fc

      SHA256

      07517216337b618d8510f9f38e57352a9da59cbbb54e2084f829ba480e7c3cef

      SHA512

      a69b6d7acb24868e762ce67683adba7a1e53c353c21920182fa4dceb2b4c7ce48a025297e0ee13176cfb1c4a8c638b76798dcbe0ccb00a7cbe6a7fa6b648249d